First published: Tue Jun 04 2019(Updated: )
It was discovered that Berkeley DB incorrectly handled certain inputs. An attacker could possibly use this issue to read sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/db5.3-sql-util | <5.3.28+dfsg1-0.5ubuntu0.1 | 5.3.28+dfsg1-0.5ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/db5.3-util | <5.3.28+dfsg1-0.5ubuntu0.1 | 5.3.28+dfsg1-0.5ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/libdb5.3 | <5.3.28+dfsg1-0.5ubuntu0.1 | 5.3.28+dfsg1-0.5ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/libdb5.3-sql | <5.3.28+dfsg1-0.5ubuntu0.1 | 5.3.28+dfsg1-0.5ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/libdb5.3-sql-dev | <5.3.28+dfsg1-0.5ubuntu0.1 | 5.3.28+dfsg1-0.5ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/db5.3-sql-util | <5.3.28+dfsg1-0.1ubuntu0.1 | 5.3.28+dfsg1-0.1ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/db5.3-util | <5.3.28+dfsg1-0.1ubuntu0.1 | 5.3.28+dfsg1-0.1ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/libdb5.3 | <5.3.28+dfsg1-0.1ubuntu0.1 | 5.3.28+dfsg1-0.1ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/libdb5.3-sql | <5.3.28+dfsg1-0.1ubuntu0.1 | 5.3.28+dfsg1-0.1ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/libdb5.3-sql-dev | <5.3.28+dfsg1-0.1ubuntu0.1 | 5.3.28+dfsg1-0.1ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/db5.3-sql-util | <5.3.28-13.1ubuntu1.1 | 5.3.28-13.1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/db5.3-util | <5.3.28-13.1ubuntu1.1 | 5.3.28-13.1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libdb5.3 | <5.3.28-13.1ubuntu1.1 | 5.3.28-13.1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libdb5.3-sql | <5.3.28-13.1ubuntu1.1 | 5.3.28-13.1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libdb5.3-sql-dev | <5.3.28-13.1ubuntu1.1 | 5.3.28-13.1ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/db5.3-sql-util | <5.3.28-11ubuntu0.2 | 5.3.28-11ubuntu0.2 |
=16.04 | ||
All of | ||
ubuntu/db5.3-util | <5.3.28-11ubuntu0.2 | 5.3.28-11ubuntu0.2 |
=16.04 | ||
All of | ||
ubuntu/libdb5.3 | <5.3.28-11ubuntu0.2 | 5.3.28-11ubuntu0.2 |
=16.04 | ||
All of | ||
ubuntu/libdb5.3-sql | <5.3.28-11ubuntu0.2 | 5.3.28-11ubuntu0.2 |
=16.04 | ||
All of | ||
ubuntu/libdb5.3-sql-dev | <5.3.28-11ubuntu0.2 | 5.3.28-11ubuntu0.2 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Berkeley DB vulnerability is USN-4004-1.
The severity of the Berkeley DB vulnerability is not mentioned in the provided information.
The Berkeley DB vulnerability could allow an attacker to read sensitive information.
The software versions affected by the Berkeley DB vulnerability include Ubuntu 19.04, 18.10, 18.04, and 16.04.
To fix the Berkeley DB vulnerability, you should update the affected software to version 5.3.28+dfsg1-0.5ubuntu0.1 for Ubuntu 19.04, version 5.3.28+dfsg1-0.1ubuntu0.1 for Ubuntu 18.10, version 5.3.28-13.1ubuntu1.1 for Ubuntu 18.04, and version 5.3.28-11ubuntu0.2 for Ubuntu 16.04.